Free Republic
Browse · Search
News/Activism
Topics · Post Article

Gee, I wonder who could do that?
1 posted on 06/17/2013 9:33:36 AM PDT by Nachum
[ Post Reply | Private Reply | View Replies ]


To: Jet Jaguar; NorwegianViking; ExTexasRedhead; HollyB; FromLori; EricTheRed_VocalMinority; ...

The list, Ping

Let me know if you would like to be on or off the ping list

http://www.nachumlist.com/


2 posted on 06/17/2013 9:34:12 AM PDT by Nachum (The Obama "List" at www.nachumlist.com)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum

As soon as she began publishing stories about fast and furious would be my guess as to when this hacking began. My sense is DOJ was interested in her sources within the government, especially in ATF and the legislative branch.


3 posted on 06/17/2013 9:40:10 AM PDT by Mouton (108th MI Group.....68-71)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum

Exploiting a Windows operating system is neither hard nor sophisticated. In the case of buffer and unpatched database exploits, there are more holes than one could possibly count.

Most corporate entities don’t have sufficient security for their systems, esp. once you get inside. If a hacker managed to brute force a password or use DDOS find open ports, once they’re inside, the kingdom is theirs.


4 posted on 06/17/2013 9:40:36 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 1 | View Replies ]

Attkisson: Hacker Highly Skilled, Used Very Sophisticated Methods

And your tax dollars likely paid the hacker to hack you.
Convenient, isn't it?
5 posted on 06/17/2013 9:41:58 AM PDT by RandallFlagg (IRS = Internal Revenge Service)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum

I believe that she was an obama worshiperand enabler and that she worked for an obama worshiper and enabler organization. If this is how obama does his friends, what do you expect him to do to his enemies. And you can bet your ass this was done at either obama’s order or his expectation.But then agan, when one rides a tighr, sometimes the tighr turns and eats said rider.


6 posted on 06/17/2013 9:45:16 AM PDT by sport
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum; LucyT; azishot; MestaMachine

With the multitude of scandals, revelations and whistle-blowing, I’m sure the commies in charge hire commie “contractors” for their dirty, unconstitutional jobs.

As long as taxpayers’ money is plenty, you’ll get no whistle-blowing and you’ll never be able to trace hacking back to the regime and it’s cronies.

However, the opposite isn’t true, i.e., hacking commies will be found in a NY minute from the NSA-collected data. This would be advertised, mega-horned by the MSM (who at last found something to “report”) and quite likely a speech from 0b0z0 about finding the needle in haystack!


10 posted on 06/17/2013 10:02:45 AM PDT by melancholy (Professor S. Alinsky, Fleet Maintenance, White Hive Trolley Bosses)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Nachum

If they were that skilled and that sophistacated, no one would ever know.


12 posted on 06/17/2013 10:14:21 AM PDT by PUGACHEV
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson